· Overview ·
· Origins ·
· Distribution ·
· Operation ·
· Detection and Removal ·
· Research ·



MultiDropper-U [McAfee], Trj/W32.Joiner.J [Panda], TrojanDropper.Win32.Joiner.j [Kaspersky], Trojan-Dropper.Win32.Joiner.j [Kaspersky], Win32.DeepThroat.31 [Computer Associates], Win32/TrojanDropper.Joiner.I trojan [Eset], Win32/Xcvbnm!Trojan [Computer Associates]


Dropper: In viruses and trojans, the dropper is the part of the program that installs the hostile code onto the system.

Trojan: Any program with a hidden intent. Trojans are one of the leading causes of breaking into machines. If you pull down a program from a chat room, new group, or even from unsolicited e-mail, then the program is likely trojaned with some subversive purpose. The word Trojan can be used as a verb: To trojan a program is to add subversive functionality to an existing program. For example, a trojaned login program might be programmed to accept a certain password for any user's account that the hacker can use to log back into the system at any time. Rootkits often contain a suite of such trojaned programs.

Similar Pests:

Dropper · Trojan


Date of Origin:

August, 1999



  • Win32/Xcvbnm.Trojan: < 0.00005%
  • More Info

    Clot Factor:

  • Win32/Xcvbnm.Trojan: < 1
  • The "Clot Factor" is a measure of how much a pest "gums up" a machine by adding registry entries, files, and directories. As more objects are placed in a machine, manual removal becomes more difficult and more error-prone.

    Countries Affected:

    In the past three months, we have received reports of Win32/Xcvbnm.Trojan in United States.


    Storage Required:

  • Win32/Xcvbnm.Trojan: at least 29 KB
  • Detection and Removal

    Automatic Removal:

    PestPatrol detects this.

    PestPatrol removes this.

    Manual Removal:

    Follow these steps to remove Win32/Xcvbnm.Trojan from your machine. Begin by backing up your registry and your system, and/or setting a Restore Point, to prevent trouble if you make a mistake.
    Unregister DLLs:

    Unregister these DLLs with Regsvr32, then reboot:

    Remove Files:

    Remove these files (if present) with Windows Explorer:


    File Analyses:

    More Info:

  • AllTheWeb, AltaVista, AOL Search, Ask Jeeves, Google, HotBot, Lycos, LookSmart, MSN, Yahoo!
  • Research By:

  • PestPatrol's Pest Research Center
  • Last Revised:

    April 07, 2005